Security by typing.
Mourad DebbabiNancy A. DurginMohamed MejriJohn C. MitchellPublished in: Int. J. Softw. Tools Technol. Transf. (2003)
Keyphrases
- intrusion detection
- information security
- security policies
- access control
- network security
- security requirements
- security issues
- security properties
- real time
- computer security
- security threats
- security problems
- security systems
- network management
- security mechanisms
- data security
- security protocols
- cyber security
- security measures
- high security
- risk analysis
- statistical databases
- low cost
- case study
- information systems
- social networks
- data sets